Welcome!

News Feed Item

INSIDE Secure First to Market with Secure Element IP Solution

INSIDE Secure (NYSE Euronext Paris: INSD), a leader in embedded security solutions for mobile and connected devices, today introduced a new approach to embedding a robust security platform in mobile devices to fortify and protect them against system integrity attacks. The first of its kind, the power-optimized INSIDE Secure VaultIP solution provides a set of certification-ready hardware IP modules that chip makers can use to quickly and cost effectively embed hardware secure elements in their mobile designs, either stand-alone or for use in an ARM TrustZone® architecture. With VaultIP security, mobile devices are better able to protect data in banking, payment and ticketing applications, secure identity and communications in enterprise, health care and government applications, and support content protection and DRM systems in media and entertainment applications, among other uses.

“This breakthrough offering is a direct result of our acquisition of ESS, and demonstrates how the combination of our collective expertise in silicon IP and secure element technologies enables INSIDE to deliver an embedded security platform that provides both software and hardware system integrity to protect a wide variety of applications,” said Dr. Simon Blake-Wilson, executive vice president of the Mobile Security division at INSIDE Secure. “This certification-ready silicon IP approach will enable our customers to get their products to market more quickly and more easily attain relevant security validations, including EMVCo, GlobalPlatform, FIPS 140-2 and Common Criteria certifications.”

The value of the confidential data routinely held in today’s smartphones, tablets and other mobile devices has spawned the development of a diverse range of increasingly sophisticated software and hardware attacks aimed at piercing their security. As a result, the risk of data theft or compromise for businesses and individuals alike is increasing exponentially.

The VaultIP solution protects confidential data, including cryptographic keys and other sensitive assets, ensuring that they are never exposed to unsecured access. It securely stores root keys and enforces key management policies in hardware, ensuring that keys are never exposed to the kinds of vulnerabilities inherent in handling by software.

The VaultIP solution forms the foundation for mobile device security by providing a protected area within which trusted applications can execute without disturbance, tampering or eavesdropping by any of these attack methods. When used in conjunction with a Trusted Execution Environment (TEE), the VaultIP solution ensures the integrity of the TEE by providing an additional layer of defense to anchor the system and enable 360-degree security for mobile devices. VaultIP therefore complements INSIDE Secure’s existing portfolio on mobile security solutions, providing an optional hardware-based foundation for the software solutions, and designed to operate in conjunction with the stand-alone VaultSE chips to offer optimal security.

INSIDE Secure offers a broad portfolio of embedded hardware and software solutions that help customers reduce project cost, complexity, risk and time to market. Globally recognized experts in standards and cryptography, INSIDE Secure delivers proven integrations, extensive documentation and experienced developer-level technical support for the leading mobile devices and client- and server-side operating systems to put technologists on the most efficient development path.

Availability and Pricing

The VaultIP secure element hardware IP is available now. Please contact INSIDE Secure for pricing information.

About INSIDE Secure

INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD) provides comprehensive embedded security solutions. World-leading companies rely on INSIDE Secure’s mobile security and secure transaction offerings to protect critical assets including connected devices, content, services, identity and transactions. Unmatched security expertise combined with a comprehensive range of IP, semiconductors, software and associated services gives INSIDE Secure customers a single source for advanced solutions and superior investment protection. For more information, visit www.insidesecure.com

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Both SaaS vendors and SaaS buyers are going “all-in” to hyperscale IaaS platforms such as AWS, which is disrupting the SaaS value proposition. Why should the enterprise SaaS consumer pay for the SaaS service if their data is resident in adjacent AWS S3 buckets? If both SaaS sellers and buyers are using the same cloud tools, automation and pay-per-transaction model offered by IaaS platforms, then why not host the “shrink-wrapped” software in the customers’ cloud? Further, serverless computing, cl...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
SYS-CON Events announced today that DatacenterDynamics has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY. DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Ca...
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and micro services. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your contain...
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
Niagara Networks exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, introduced the technologies required for implementing these idea...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.